lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20171022165109.GA33676@jaegeuk-macbookpro.roam.corp.google.com> Date: Sun, 22 Oct 2017 09:51:09 -0700 From: Jaegeuk Kim <jaegeuk@...nel.org> To: Chao Yu <chao@...nel.org> Cc: linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org, linux-f2fs-devel@...ts.sourceforge.net Subject: Re: [f2fs-dev] [PATCH 2/2] f2fs: relax EIO injection for quota file On 10/22, Chao Yu wrote: > On 2017/10/20 0:56, Jaegeuk Kim wrote: > > This case is not happening easily. > > Actually it can happen, so why not just keep it? Okay, so let me keep this patch for local stress tests only. Thanks, > > Thanks, > > > > > Signed-off-by: Jaegeuk Kim <jaegeuk@...nel.org> > > --- > > fs/f2fs/f2fs.h | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h > > index e0ef31cb2cc6..6301ccca8888 100644 > > --- a/fs/f2fs/f2fs.h > > +++ b/fs/f2fs/f2fs.h > > @@ -1544,7 +1544,7 @@ static inline int inc_valid_block_count(struct f2fs_sb_info *sbi, > > return ret; > > > > #ifdef CONFIG_F2FS_FAULT_INJECTION > > - if (time_to_inject(sbi, FAULT_BLOCK)) { > > + if (!IS_NOQUOTA(inode) && time_to_inject(sbi, FAULT_BLOCK)) { > > f2fs_show_injection_info(FAULT_BLOCK); > > release = *count; > > goto enospc; > >
Powered by blists - more mailing lists